Security Verification via Automatic Hardware-Aware Exploit Synthesis: The CheckMate Approach

Caroline Trippel, Daniel Lustig, Margaret Martonosi. Security Verification via Automatic Hardware-Aware Exploit Synthesis: The CheckMate Approach. IEEE Micro, 39(3):84-93, 2019. [doi]

@article{TrippelLM19,
  title = {Security Verification via Automatic Hardware-Aware Exploit Synthesis: The CheckMate Approach},
  author = {Caroline Trippel and Daniel Lustig and Margaret Martonosi},
  year = {2019},
  doi = {10.1109/MM.2019.2910010},
  url = {https://doi.org/10.1109/MM.2019.2910010},
  researchr = {https://researchr.org/publication/TrippelLM19},
  cites = {0},
  citedby = {0},
  journal = {IEEE Micro},
  volume = {39},
  number = {3},
  pages = {84-93},
}